0% found this document useful (0 votes)
35 views1 page

Topics Pages: 3.3.1 LSB Sequential Substitution 11 3.3.2 Pixel Indicator Method 14 3.3.3 Coded LSB Substitution 17

This document outlines the contents of a paper organized into 5 chapters. Chapter 1 provides an introduction and objectives. Chapter 2 discusses the background and evolution of steganography. Chapter 3 analyzes and designs different steganography algorithms. Chapter 4 presents results on encoding, decoding, image quality, capacity, and security. Chapter 5 provides a conclusion and discusses future work.

Uploaded by

moinulmithu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views1 page

Topics Pages: 3.3.1 LSB Sequential Substitution 11 3.3.2 Pixel Indicator Method 14 3.3.3 Coded LSB Substitution 17

This document outlines the contents of a paper organized into 5 chapters. Chapter 1 provides an introduction and objectives. Chapter 2 discusses the background and evolution of steganography. Chapter 3 analyzes and designs different steganography algorithms. Chapter 4 presents results on encoding, decoding, image quality, capacity, and security. Chapter 5 provides a conclusion and discusses future work.

Uploaded by

moinulmithu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Contents

Topics Pages

Chapter 1 Introduction 1-3


1.1 Introduction 1
1.2 Motivation 2
1.3 Objective 3

Chapter 2 Background 4-6


2.1Evolution of Steganography 4
2.2 Digital Steganography 6
2.3 Applications 6

Chapter 3 Analysis & Design 7-20


3.1 Analysis 7
3.2 Principle 8
3.3 Algorithms 11
3.3.1 LSB Sequential Substitution 11
3.3.2 Pixel Indicator Method 14
3.3.3 Coded LSB Substitution 17
3.4 System Requirement 20

Chapter 4 Results 21-30


4.1 Encoding & Decoding 21
4.2 Image Perceptibility 25
4.3 Image capacity 28
4.4 Security 29
4.5 Comparison 30

Chapter 5 Concussion 31-31


5.1 Conclusion 31
5.2 Future Work 31

References 32

Appendix 33-53
Encoder code 33
Decoder code 45

You might also like